Bug#605090: Updated patch

2011-01-26 Thread Bastian Blank
On Tue, Jan 18, 2011 at 06:32:50PM +0100, Yves-Alexis Perez wrote:
 I've started working on 2.6.37 since Brad Sprengler recently released
 the grsecurity patch for that kernel.

Is there VCS or is this just a code drop without information about
changes? I was not even able to find older patches. Who does code
reviews without that information?

The patch includes several modifications to selinux and random other
parts. Why are they not merged? Please show that they have been
submitted at least.

 Initial packaging for linux-grsec-base is at
 http://git.debian.org/?p=collab-maint/linux-grsec-base.git;a=summary if
 needed.

Why is this not part of the patch below?

Currently the patch only includes informations for i386 and amd64.
Please state your intentions about other architectures.

 +  [ Yves-Alexis Perez ]
 +  * Add a grsecurity featureset.

*nitpick* the patch calls it Grsecurity.

 Index: debian/config/featureset-grsec/config
 ===
 --- debian/config/featureset-grsec/config (revision 0)
 +++ debian/config/featureset-grsec/config (revision 0)
 @@ -0,0 +1,152 @@
 +CONFIG_DEBUG_STRICT_USER_COPY_CHECKS=y

Please show why this should not be enabled globaly.

 +CONFIG_DEBUG_RODATA=y

x86 specific and default on.

Bastian

-- 
It would be illogical to kill without reason.
-- Spock, Journey to Babel, stardate 3842.4



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110126080308.gb27...@wavehammer.waldi.eu.org



Bug#607879: System hangs up with mmap.c:873!

2011-01-26 Thread Ronny Standtke
 This *is* explained on the page I pointed you at.

Sorry for being a *blind* newbie...

After building the linux-base package I was able to install the patched linux-
image package.

The system I am trying to build with live-build also needs the linux-headers 
package because of some dkms packages. Unfortunately, there is again a 
dependency problem:


# dpkg -i linux-headers-2.6.32-5-686_2.6.32-30a~test_i386.deb 
(Reading database ... 166017 files and directories currently installed.)
Preparing to replace linux-headers-2.6.32-5-686 2.6.32-30a~test (using linux-
headers-2.6.32-5-686_2.6.32-30a~test_i386.deb) ...
Unpacking replacement linux-headers-2.6.32-5-686 ...
dpkg: dependency problems prevent configuration of linux-headers-2.6.32-5-686:
 linux-headers-2.6.32-5-686 depends on linux-headers-2.6.32-5-common (= 
2.6.32-30a~test); however:
  Version of linux-headers-2.6.32-5-common on system is 2.6.32-30.
dpkg: error processing linux-headers-2.6.32-5-686 (--install):
 dependency problems - leaving unconfigured
Errors were encountered while processing:
 linux-headers-2.6.32-5-686


Unfortunately, I could not find any information about this issue on the page 
you pointet me at. Fortunately, after some trial and error, I successfully 
built a linux-headers-2.6.32-5-common_2.6.32-30a~test package with the 
following two commands:


export UPSTREAMVERSION=2.6.32-5
fakeroot make -f debian/rules.real binary-arch-featureset


Is this the right way?

Best regards

Ronny



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201101261104.10803.ronny.stand...@gmx.net



Bug#599615: linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!

2011-01-26 Thread Maciej Gałkiewicz
I think that I have the same problem with 2.6.32-5-xen-amd64
(2.6.32-30). When I try to reboot the server:

Jan 26 10:48:18 cc kernel: [43467.083492] [ cut here ]
Jan 26 10:48:18 cc kernel: [43467.083526] kernel BUG at
/build/buildd-linux-2.6_2.6.32-30-amd64-d4MbNM/linu
x-2.6-2.6.32/debian/build/source_amd64_xen/drivers/md/md.c:6195!
Jan 26 10:48:18 cc kernel: [43467.083584] invalid opcode:  [#1] SMP
Jan 26 10:48:18 cc kernel: [43467.083618] last sysfs file:
/sys/hypervisor/version/minor
Jan 26 10:48:18 cc kernel: [43467.083647] CPU 6
Jan 26 10:48:18 cc kernel: [43467.083673] Modules linked in: ext2
act_police cls_flow cls_fw cls_u32 sch_htb sch_hfsc sch_ingress
sch_sfq xt_time xt_connlimit xt_realm iptable_raw xt_comment xt_recent
xt_policy ipt_ULOG ipt_REJECT ipt_REDIRECT ipt_NETMAP ipt_MASQUERADE
ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype nf_nat_tftp
nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc
nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda
nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip
nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre
nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc
nf_conntrack_h323 nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss
xt_pkttype xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport
xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper
xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK
xt_connmark xt_CLASSIFY iptable_nat nf_nat iptable_mangle nfnetlink
ipt_LOG xt_tcpudp nf_conntrack_ipv4 nf_defrag_ip
Jan 26 10:48:18 cc kernel: v4 xt_state nf_conntrack xt_physdev
ip6table_filter ip6_tables xen_evtchn xenfs ccm ecb sha512_generic
xfrm_user ah6 ah4 esp6 esp4 xfrm4_mode_beet xfrm4_tunnel tunnel4
xfrm4_mode_tunnel xfrm4_mode_transport xfrm6_mode_transport
xfrm6_mode_ro xfrm6_mode_beet xfrm6_mode_tunnel ipcomp ipcomp6
xfrm_ipcomp xfrm6_tunnel tunnel6 acpi_cpufreq cpufreq_userspace
iptable_filter cpufreq_stats ip_tables cpufreq_powersave
openvswitch_mod rng_core x_tables cpufreq_conservative deflate
zlib_deflate ctr twofish twofish_common camellia serpent blowfish
cast5 des_generic cbc aes_x86_64 aes_generic xcbc rmd160
sha256_generic sha1_generic hmac crypto_null af_key ext3 jbd mbcache
loop snd_pcm snd_timer snd soundcore snd_page_alloc i2c_i801 pcspkr
psmouse i2c_core serio_raw evdev xfs exportfs dm_mod processor
thermal_sys acpi_processor raid10 raid456 async_raid6_recov async_pq
raid6_pq async_xor xor async_memcpy async_tx raid1 raid0 md_mod
sata_nv sata_sil sata_via 3w_9xxx 3w_ sd_mod crc_t10dif ahci r81
Jan 26 10:48:18 cc kernel: 69 uhci_hcd mii libata ehci_hcd scsi_mod
usbcore nls_base [last unloaded: scsi_transport_iscsi]
Jan 26 10:48:18 cc kernel: [43467.085090] Pid: 2993, comm: xenstored
Tainted: P   2.6.32-5-xen-amd64 #1 MS-7522
Jan 26 10:48:18 cc kernel: [43467.085139] RIP:
e030:[a00c1e08]  [a00c1e08]
md_write_start+0x1d/0x15c [md_mod]
Jan 26 10:48:18 cc kernel: [43467.085200] RSP: e02b:8801c5ce98f8
EFLAGS: 00010246
Jan 26 10:48:18 cc kernel: [43467.085229] RAX: 0001 RBX:
8801ecea3400 RCX: 12c0675c
Jan 26 10:48:18 cc kernel: [43467.085261] RDX:  RSI:
88014a4a8180 RDI: 8801ecea3400
Jan 26 10:48:18 cc kernel: [43467.085294] RBP: 8801ecea3400 R08:
 R09: 00ff
Jan 26 10:48:18 cc kernel: [43467.085326] R10: 8100ecf2 R11:
003f R12: 00ff
Jan 26 10:48:18 cc kernel: [43467.085359] R13: 8801ec7511a0 R14:
88014a4a8180 R15: 8801ec799240
Jan 26 10:48:18 cc kernel: [43467.085394] FS:  7f91f689a700()
GS:88000abbf000() knlGS:
Jan 26 10:48:18 cc kernel: [43467.085444] CS:  e033 DS:  ES: 
CR0: 8005003b
Jan 26 10:48:18 cc kernel: [43467.085473] CR2: 00618d50 CR3:
0001c5cb2000 CR4: 2660
Jan 26 10:48:18 cc kernel: [43467.085506] DR0:  DR1:
 DR2: 
Jan 26 10:48:18 cc kernel: [43467.085539] DR3:  DR6:
0ff0 DR7: 0400
Jan 26 10:48:18 cc kernel: [43467.085571] Process xenstored (pid:
2993, threadinfo 8801c5ce8000, task 8801c8233880)
Jan 26 10:48:18 cc kernel: [43467.085621] Stack:
Jan 26 10:48:18 cc kernel: [43467.085643]  0006
 8801c8233b78 000100a4a915
Jan 26 10:48:18 cc kernel: [43467.085686] 0 0040
fffe 0021 8801ecea3400
Jan 26 10:48:18 cc kernel: [43467.085751] 0 00ff
a00db12c  
Jan 26 10:48:18 cc kernel: [43467.085834] Call Trace:
Jan 26 10:48:18 cc kernel: [43467.085863]  [a00db12c] ?
make_request+0x2e/0x7aa [raid1]
Jan 26 10:48:18 cc kernel: [43467.085897]  [812c0cf8] ?
unix_poll+0x0/0x8d
Jan 26 10:48:18 cc kernel: [43467.085928]  [8100e63d] ?
xen_force_evtchn_callback+0x9/0xa
Jan 26 

Bug#605090: Updated patch

2011-01-26 Thread Yves-Alexis Perez
First, thanks for your comments. I'm replying to both mails at once.

On mer., 2011-01-26 at 08:25 +0100, Bastian Blank wrote:
 On Tue, Jan 18, 2011 at 06:32:50PM +0100, Yves-Alexis Perez wrote:
  Index: debian/config/i386/grsec/defines
  ===
  --- debian/config/i386/grsec/defines(revision 0)
  +++ debian/config/i386/grsec/defines(revision 0)
  @@ -0,0 +1,9 @@
  +[base]
  +flavours:
  + 686
 
 No new non-pae image.

Ok. In fact it's a good idea anyway because having PAE on means we have
NX which makes it easier for Grsecurity.

 
  + amd64
 
 Why?

Because people using 64bit kernels on i386 might still want a grsec
variant.
 
  +[grsec]
  +flavours:
  + i386
  + amd64
 
 What is this?

I didn't really find the syntax for the “defines” files so I looked at
the others ones and xen has that [xen] section but maybe it's only used
internall by xen feature set. Will remove and check it doesn't break
anything.
 
  Index: debian/config/i386/defines
  ===
  --- debian/config/i386/defines  (revision 16824)
  +++ debian/config/i386/defines  (working copy)
  @@ -3,6 +3,7 @@
openvz
vserver
xen
  + grsec
 
 This was a sorted list.

Fixed.
 
  Index: debian/config/featureset-grsec/config
  ===
  --- debian/config/featureset-grsec/config   (revision 0)
  +++ debian/config/featureset-grsec/config   (revision 0)
  @@ -0,0 +1,152 @@
  +# Disable XEN for UDEREF support
  +CONFIG_XEN=n
 
 Nope. Disabling core stuff needs more information.

As the comment says, this is because UDEREF conflicts with XEN. The help
for the Kconfig option says:

config PAX_MEMORY_UDEREF
bool Prevent invalid userland pointer dereference
depends on X86  !UML_X86  !XEN
select PAX_PER_CPU_PGD if X86_64
help
  By saying Y here the kernel will be prevented from dereferencing
  userland pointers in contexts where the kernel expects only kernel
  pointers.  This is both a useful runtime debugging feature and a
  security measure that prevents exploiting a class of kernel bugs.

  The tradeoff is that some virtualization solutions may experience
  a huge slowdown and therefore you should not enable this feature
  for kernels meant to run in such environments.  Whether a given VM
  solution is affected or not is best determined by simply trying it
  out, the performance impact will be obvious right on boot as this
  mechanism engages from very early on.  A good rule of thumb is that
  VMs running on CPUs without hardware virtualization support (i.e.,
  the majority of IA-32 CPUs) will likely experience the slowdown.


I was assuming people wanting a grsec kernel would prefer having UDEREF
than XEN, but we might as well use the more conservative approach and
keep XEN enabled (and UDEREF disabled) and wait for feedback from users.
If bugreports are reported asking for UDEREF we can still revisite that
later.

 
  Index: debian/config/featureset-grsec/defines
  ===
  --- debian/config/featureset-grsec/defines  (revision 0)
  +++ debian/config/featureset-grsec/defines  (revision 0)
  @@ -0,0 +1,8 @@
  +[description]
  +part-short-grsec: Grsecurity and PaX protection
 
 This is already too long.

What would be a good limit? Would “Grsecurity protection” work? As I
understand it it's added to the short description of the various
packages for that featureset so the total should be kept under 80 chars.
Looking at other featureset we could go for “Grsecurity support” but I'm
not sure it makes much sense.
 
  +[image]
  +depends: linux-grsec-base,, paxctl
 
 Why is paxctl necessary? Also syntax error.

PAX security features will enforce W^X mmap() (RANDMMAP), which some
application don't like (for example browsers with JIT javascript
engines). If one wants to use those application she has to disable it on
the executable itself, which is done using paxctl (which can be used to
enable/disable other protection type at runtime).

It's not strictly a dependency so it can be demoted to Recommends (or
moved to linux-grsec-base only) if you prefer. 

Syntax error is fixed.

 
  --- debian/config/amd64/grsec/config(revision 0)
  +++ debian/config/amd64/grsec/config(revision 0)
  @@ -0,0 +1,5 @@
  +#
  +# PaX
  +#
  +CONFIG_PAX_PER_CPU_PGD=y
  +CONFIG_TASK_SIZE_MAX_SHIFT=42
 
 Remove, no real settings here.

What do you mean by “real” settings? PAX_PER_CPU_PGD is enabled by
UDEREF and TASK_SIZE_MAX_SHIFT is set to 42 on amd64 because of how it
has been implemented without segmentation.

More info can be found there:
http://grsecurity.net/pipermail/grsecurity/2010-April/001024.html

Due to the performances concerns, I've decided to keep UDEREF and

Bug#506540: /usr/sbin/update-initramfs: update-initramfs miss symlink Possible missing firmware tigon

2011-01-26 Thread tekmans
Package: initramfs-tools
Severity: normal
File: /usr/sbin/update-initramfs

miss symlink to the original tigon firmware installed during the debian 
installation added by usb stick
resolve trouble by adding the missing link

-- Package-specific info:
-- initramfs sizes
-rw-r--r-- 1 root root 8.5M Jan 26 12:40 /boot/initrd.img-2.6.32-5-686
-- /proc/cmdline
BOOT_IMAGE=/boot/vmlinuz-2.6.32-5-686 
root=UUID=965c0c14-ce59-45cb-98b1-f4125f965fe8 ro quiet

-- resume
RESUME=UUID=0a07b1a4-7a8d-448c-a56c-e61f524bca23
-- /proc/filesystems
ext4

-- lsmod
Module  Size  Used by
md_mod 67345  0 
loop9765  0 
snd_intel8x0   19595  0 
snd_ac97_codec 79148  1 snd_intel8x0
nouveau   314892  1 
ttm33386  1 nouveau
ac97_bus 710  1 snd_ac97_codec
drm_kms_helper 18309  1 nouveau
snd_pcm47226  2 snd_intel8x0,snd_ac97_codec
drm   112088  3 nouveau,ttm,drm_kms_helper
i2c_algo_bit3497  1 nouveau
snd_timer  12258  1 snd_pcm
usbhid 28008  0 
snd34375  4 snd_intel8x0,snd_ac97_codec,snd_pcm,snd_timer
parport_pc 15799  0 
soundcore   3450  1 snd
psmouse44657  0 
evdev   5609  4 
rng_core2178  0 
hid50893  1 usbhid
i2c_i8016462  0 
parport22554  1 parport_pc
snd_page_alloc  5045  2 snd_intel8x0,snd_pcm
i2c_core   12696  5 nouveau,drm_kms_helper,drm,i2c_algo_bit,i2c_i801
shpchp 21220  0 
pci_hotplug18065  1 shpchp
pcspkr  1207  0 
serio_raw   2916  0 
processor  26327  0 
button  3598  1 nouveau
ext4  257803  4 
mbcache 3762  1 ext4
jbd2   56155  1 ext4
crc16   1027  1 ext4
sg 15968  0 
sr_mod 10770  0 
cdrom  26487  1 sr_mod
sd_mod 25977  7 
crc_t10dif  1012  1 sd_mod
ata_generic 2067  0 
tg388273  0 
ata_piix   17736  5 
thermal 9206  0 
libata115753  2 ata_generic,ata_piix
uhci_hcd   16057  0 
floppy 40923  0 
libphy 11638  1 tg3
thermal_sys 9378  2 processor,thermal
ehci_hcd   27851  0 
scsi_mod  101429  4 sg,sr_mod,sd_mod,libata
usbcore98453  5 usbhid,uhci_hcd,ehci_hcd
nls_base4541  1 usbcore

-- /etc/initramfs-tools/modules

-- /etc/kernel-img.conf
# Kernel image management overrides
# See kernel-img.conf(5) for details
do_symlinks = yes
do_bootloader = no
do_initrd = yes
link_in_boot = no

-- /etc/initramfs-tools/initramfs.conf
MODULES=most
BUSYBOX=y
KEYMAP=n
COMPRESS=gzip
BOOT=local
DEVICE=
NFSROOT=auto

-- /etc/initramfs-tools/update-initramfs.conf
update_initramfs=yes
backup_initramfs=no

-- /proc/mdstat
Personalities : 
unused devices: none

-- mkinitramfs hooks
/etc/initramfs-tools/hooks/:

/usr/share/initramfs-tools/hooks:
busybox
dmsetup
keymap
klibc
mdadm
thermal
udev


-- System Information:
Debian Release: 6.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages initramfs-tools depends on:
ii  cpio  2.11-4 GNU cpio -- a program to manage ar
ii  findutils 4.4.2-1+b1 utilities for finding files--find,
ii  klibc-utils   1.5.20-1   small utilities built with klibc f
ii  module-init-tools 3.12-1 tools for managing Linux kernel mo
ii  udev  164-3  /dev/ and hotplug management daemo

Versions of packages initramfs-tools recommends:
ii  busybox   1:1.17.1-8 Tiny utilities for small and embed

Versions of packages initramfs-tools suggests:
ii  bash-completion   1:1.2-3programmable completion for the ba

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20110126132512.16642.29669.report...@sparkle.etincelles.homelinux.org



Bug#506540: /usr/sbin/update-initramfs: update-initramfs miss symlink Possible missing firmware tigon

2011-01-26 Thread maximilian attems
tags 506540 moreinfo
stop

On Wed, Jan 26, 2011 at 02:25:12PM +0100, tekmans wrote:
 Package: initramfs-tools
 Severity: normal
 File: /usr/sbin/update-initramfs
 
 miss symlink to the original tigon firmware installed during the debian 
 installation added by usb stick
 resolve trouble by adding the missing link

could you be more concrete and tell how this symlink /lib/firmware looks like,
aka ls -l  of it, thanks.



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110126133527.ga21...@vostochny.stro.at



Processed: Re: Bug#506540: /usr/sbin/update-initramfs: update-initramfs miss symlink Possible missing firmware tigon

2011-01-26 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 506540 moreinfo
Bug #506540 [initramfs-tools] initramfs-tools - Always dereferences symlinks
Added tag(s) moreinfo.
 stop
Stopping processing here.

Please contact me if you need assistance.
-- 
506540: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506540
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.12960489821734.transcr...@bugs.debian.org



Bug#605090: Updated patch

2011-01-26 Thread Bastian Blank
On Wed, Jan 26, 2011 at 01:29:14PM +0100, Yves-Alexis Perez wrote:
 On mer., 2011-01-26 at 08:25 +0100, Bastian Blank wrote:
  On Tue, Jan 18, 2011 at 06:32:50PM +0100, Yves-Alexis Perez wrote:
   +# Disable XEN for UDEREF support
 As the comment says, this is because UDEREF conflicts with XEN. The help
 for the Kconfig option says:

And why does it conflict with XEN? The documentation does not provide
any specific pointers. From my view it is easy, it have to run on my
test environments that features heavy virtualization of different types.

   +part-short-grsec: Grsecurity and PaX protection
  This is already too long.
 What would be a good limit? Would “Grsecurity protection” work?

Should be okay.

   +depends: linux-grsec-base,, paxctl
  Why is paxctl necessary? Also syntax error.
 It's not strictly a dependency so it can be demoted to Recommends (or
 moved to linux-grsec-base only) if you prefer. 

Okay.

   +++ debian/config/amd64/grsec/config  (revision 0)
  Remove, no real settings here.
 What do you mean by “real” settings? PAX_PER_CPU_PGD is enabled by
 UDEREF and TASK_SIZE_MAX_SHIFT is set to 42 on amd64 because of how it
 has been implemented without segmentation.

Real settings can be modified by the user, this two can't.

 On mer., 2011-01-26 at 09:03 +0100, Bastian Blank wrote:
 On Tue, Jan 18, 2011 at 06:32:50PM +0100, Yves-Alexis Perez wrote:
   I've started working on 2.6.37 since Brad Sprengler recently
 released
   the grsecurity patch for that kernel.
  Is there VCS or is this just a code drop without information about
  changes? I was not even able to find older patches. Who does code
  reviews without that information?
 No there is no VCS unfortunately.

You will need a git repository in the future. So please start with it.

  The patch includes several modifications to selinux and random other
  parts. Why are they not merged? Please show that they have been
  submitted at least.
 As I already pointed out on the first mail, Brad Sprengler has already
 said he wasn't interested in upstreaming stuff.

What Brad wants or don't want is irrelevant here. While the patch policy
for the main kernel is rather strict, other featuresets can incorporate
more changes. However this is no free ticket to push anything into it.

 There is an upstreaming
 effort for some specific bits (like the
 https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening#Upstream
 Hardening I already gave).

Please explain how this is related to Grsecurity.

The selinux-specific part are related to the
 effort to make function pointers structures read-only (or do you have
 other specific parts in mind?).

Everything that is not directly related to Grsecurity or PaX. And there
is a lot.

   http://git.debian.org/?p=collab-maint/linux-grsec-base.git;a=summary
 if
   needed.
  Why is this not part of the patch below?
 The grsec.conf was attached to the initial bug report. As there is no
 easy way to ship an external file in the linux-image, I was told it'd be
 a better idea to make an external package and that helps because I can
 do the user creation there and add a README.

External _binary_ package, not source package.

   +CONFIG_DEBUG_STRICT_USER_COPY_CHECKS=y
  Please show why this should not be enabled globaly.
 Good point, it should. I'll make a separated bug report.

No need for a bug.

   +CONFIG_DEBUG_RODATA=y
 Fixed.

The current patch even marks it as broken.

Bastian

-- 
Beam me up, Scotty, there's no intelligent life down here!



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110126135443.ga1...@wavehammer.waldi.eu.org



Bug#506540: /usr/sbin/update-initramfs: update-initramfs miss symlink Possible missing firmware tigon

2011-01-26 Thread ~ tekmans ~

 tags 506540 moreinfo
 stop

 On Wed, Jan 26, 2011 at 02:25:12PM +0100, tekmans wrote:
 Package: initramfs-tools
 Severity: normal
 File: /usr/sbin/update-initramfs

 miss symlink to the original tigon firmware installed during the debian
 installation added by usb stick
 resolve trouble by adding the missing link

 could you be more concrete and tell how this symlink /lib/firmware looks
 like,
 aka ls -l  of it, thanks.

I was installing mdadm, sample output below

update-initramfs: Generating /boot/initrd.img-2.6.32-5-686
W: Possible missing firmware /lib/firmware/tigon/tg3_tso.bin for module tg3
W: Possible missing firmware /lib/firmware/tigon/tg3.bin for module tg3

ls -l  /lib/firmware/tigon/
lrwxrwxrwx 1 root root   32 26 janv. 12:40 tg3.bin -
/lib/firmware/tigon/tg3_tso5.bin
-rwxr-xr-x 1 root root 3884 14 oct.   2009 tg3_tso5.bin
lrwxrwxrwx 1 root root   32 26 janv. 12:40 tg3_tso.bin -
/lib/firmware/tigon/tg3_tso5.bin


Original tigon added during the debian installation was tg3_tso5.bin, and
the link were hadded by myself.

Followed by apt-get install --reinstall mdadm, and complete without W:
Possible missing firmware

I hope, it'll be helpful



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/ac9badd03d8b1bd566cead9c923f7d0d.squir...@webmail.no-log.org



Bug#506540: /usr/sbin/update-initramfs: update-initramfs miss symlink Possible missing firmware tigon

2011-01-26 Thread maximilian attems
On Wed, Jan 26, 2011 at 04:23:24PM +0100, ~ tekmans ~ wrote:
 
 
 I was installing mdadm, sample output below
 
 update-initramfs: Generating /boot/initrd.img-2.6.32-5-686
 W: Possible missing firmware /lib/firmware/tigon/tg3_tso.bin for module tg3
 W: Possible missing firmware /lib/firmware/tigon/tg3.bin for module tg3

tg3 stipulates it needs all the thre firmware files:
MODULE_FIRMWARE(FIRMWARE_TG3);
MODULE_FIRMWARE(FIRMWARE_TG3TSO);
MODULE_FIRMWARE(FIRMWARE_TG3TSO5);

update-initramfs can't know that the last one is enough for this hardware.

 
 ls -l  /lib/firmware/tigon/
 lrwxrwxrwx 1 root root   32 26 janv. 12:40 tg3.bin -
 /lib/firmware/tigon/tg3_tso5.bin
 -rwxr-xr-x 1 root root 3884 14 oct.   2009 tg3_tso5.bin
 lrwxrwxrwx 1 root root   32 26 janv. 12:40 tg3_tso.bin -
 /lib/firmware/tigon/tg3_tso5.bin

so this looks like special tricking, just properly
 apt-get install firmware-linux-nonfree
 
 
 I hope, it'll be helpful

currently I think your box hasn't installed the relevant package
and thus is non-standard. I wouldn't see this a bug.
So unless convinced otherwise, will close.




-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110126155315.gc21...@vostochny.stro.at



Bug#611126: Failure on boot during initrd script execution

2011-01-26 Thread maximilian attems
reassign 611126 linux-2.6
stop
# linux-2.6 boot panic

On Tue, 25 Jan 2011, Pascal BERNARD wrote:

 Package: initramfs-tools
 Version: 0.98.7
 
 I have some kernel panic upon boot, or the init script stops and asks
 for root
 login. All my partitions are on lvm/md, including / where boot/kernel
 resides.

This is not an initramfs-tools bug as it has long handed over things
to init. 
 
 I am on testing with linux-image-2.6.32-5-amd64  2.6.32-30 at the
 moment.
 
 I have reported this problem on grub-pc (#593648), but I must say that
 the
 same grub works with a kernel on a standard partition.
 
 I noticed that if I stop grub for a minute (eg by pretending editing an
 entry before booting), there is no more problem. Is it an issue with
 data
 not flushed on disk ? My raid is a soft (linux) raid0.
 
 Please find some screen shots attached.

Did that box ever work? Is that breakage recent?
Please run memcheck on it for at least 24 hours.

also please follow up with reportbug to gather the linux-2.6
related info like lspci dmesg and so on.. so on the box:
reporbug -N bugnr

thank you.

-- 
maks



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110126170851.gl5...@stro.at



Processed: Re: Bug#611126: Failure on boot during initrd script execution

2011-01-26 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 611126 linux-2.6
Bug #611126 [initramfs-tools] Failure on boot during initrd script execution
Bug #611127 [initramfs-tools] Boot fails during initrd script execution
Bug reassigned from package 'initramfs-tools' to 'linux-2.6'.
Bug reassigned from package 'initramfs-tools' to 'linux-2.6'.
Bug No longer marked as found in versions initramfs-tools/0.98.7.
Bug No longer marked as found in versions initramfs-tools/0.98.7.
 stop
Stopping processing here.

Please contact me if you need assistance.
-- 
611126: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611126
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.129606173728724.transcr...@bugs.debian.org



Re: Bug#568088: cdrom: Debian does not boot right after installation

2011-01-26 Thread Julien Cristau
reassign 568088 linux-2.6 2.6.26-21
severity 568088 important
tag 568088 moreinfo
kthxbye

On Mon, Feb  1, 2010 at 22:46:28 +0100, Volodymyr Shcherbyna wrote:

 Package: cdrom
 Severity: critical
 Justification: breaks the whole system
 
 After installation of debian 5.0.3 x64 the OS does not boot. If I load kernel 
 with noapic nolapic acpi=off ide=nodma it works. Should you have any 
 questions about my configuration does not hesitate to ask ;)
 
On Tue, Feb  2, 2010 at 12:40:32 +0100, Volodymyr Shcherbyna wrote:

 I was able to isolate the issue. My system freezes and only acpi=off makes
 it possible to boot. My system configuration is:
 
 Asus P5QL Pro  Intel Core 2 Quad 2.5 Ghz
 
 I used latest stable netinstaller for 5.0.3 Debian, x64.
 
Does this still occur?  If yes, can you provide kernel logs?  At which
point in the boot does the system hang?

Cheers,
Julien


signature.asc
Description: Digital signature


Processed: Re: Bug#568088: cdrom: Debian does not boot right after installation

2011-01-26 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 568088 linux-2.6 2.6.26-21
Bug #568088 [cdrom] cdrom: Debian does not boot right after installation
Bug reassigned from package 'cdrom' to 'linux-2.6'.
Bug #568088 [linux-2.6] cdrom: Debian does not boot right after installation
There is no source info for the package 'linux-2.6' at version '2.6.26-21' with 
architecture ''
Unable to make a source version for version '2.6.26-21'
Bug Marked as found in versions 2.6.26-21.
 severity 568088 important
Bug #568088 [linux-2.6] cdrom: Debian does not boot right after installation
Severity set to 'important' from 'critical'

 tag 568088 moreinfo
Bug #568088 [linux-2.6] cdrom: Debian does not boot right after installation
Added tag(s) moreinfo.
 kthxbye
Stopping processing here.

Please contact me if you need assistance.
-- 
568088: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568088
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.129606198729985.transcr...@bugs.debian.org



Re: Bug#607368: Please decide how kernel ABI should be managed

2011-01-26 Thread Julien Cristau
On Sun, Dec 19, 2010 at 19:30:58 +0100, Julien BLACHE wrote:

 I think it would be best if this matter would be decided upon before the
 release of Squeeze, or not too long after it, so as to avoid further
 breakages in early kernel updates for Squeeze.
 
We're getting close to the squeeze release.  Is the technical committee
going to reach a decision on this?

Cheers,
Julien


signature.asc
Description: Digital signature


Bug#611126: Yes, this is recent

2011-01-26 Thread Pascal BERNARD
The box is running for years now. Using grub-pc with the kernel on a
lvm/md partition is more recent, but the bug is much more recent. Maybe
a month or so.

I will configure exim so that I can use reportbug for a full report.

Pascal





-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1296065001.2831.6.camel@moraes.localdomain



Bug#605090: Updated patch

2011-01-26 Thread Kees Cook
Hi,

On Wed, Jan 26, 2011 at 01:29:14PM +0100, Yves-Alexis Perez wrote:
 Due to the performances concerns, I've decided to keep UDEREF and
 KERNEXEC disabled on amd64 for now anyway, so those will disappear
 (independently of the i386 decision).

This doesn't seem like a good idea. The bulk of heavy-duty kernel hardening
is with KERNEXEC and UDEREF. If someone is interested in speed, they can
choose i386. But if someone wants a hardened kernel and amd64, they should
have the option. I'd leave those on for both.

-Kees

-- 
Kees Cook@debian.org



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110126180715.gb4...@outflux.net



Possible bug in kernel 2.6.37

2011-01-26 Thread Jean Baptiste FAVRE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello,
I'm not sure this is neither the right place, nor the right way to
introduce my problem, but I've only small kernel knowledge. Please
excuse me if I'm wrong.

I'm using 2 Debian Squeeze Xen Dom0 servers. Those 2 servers provide PCI
passthrough for a network card.
The idea is to filter network trafic inside dedicated domU instead of
having dom0 directly connected on the network.

For my tests, I choose Debian Squeeze with 2.6.37 kernel from
experimental. Here are the results:
- - Debian Squeeze 32bits + 32bits 2.6.37 kernel: incoming packets larger
than 128 bytes are blocked somewhere.
- - Debian Squeeze 32bits + 64bits 2.6.37 kernel: everything works fine.
- - Debian Squeeze 64bits + 64bits 2.6.37 kernel: everything works fine.

My first thought was I discovered a bug in Xen PCI passthrough code.
I exchange some mails on xen-devel mailing list about it, mostly with
Konrad Rzeszutek Wilk.
He asked me to do many tests which did not help to diagnose the problem.

Then he suggest me to change memory allocated to domU from 256mb to 512mb.

That solved my problem.

Now, I don't know exactly what I shall do.

Any help will be appreciated,
Regards,
Jean Baptiste Favre
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk1Afb8ACgkQM2eZoKJfKd3Y/QCgtMm2sTTj3VL/0hyPkMoP8my4
2lEAoKy13l/NiQBscuzCNmlgLc4aHfur
=HIsl
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d407dbf.6040...@jbfavre.org



Bug#605090: Updated patch

2011-01-26 Thread Yves-Alexis Perez
On mer., 2011-01-26 at 14:54 +0100, Bastian Blank wrote: 
 On Wed, Jan 26, 2011 at 01:29:14PM +0100, Yves-Alexis Perez wrote:
  On mer., 2011-01-26 at 08:25 +0100, Bastian Blank wrote:
   On Tue, Jan 18, 2011 at 06:32:50PM +0100, Yves-Alexis Perez wrote:
+# Disable XEN for UDEREF support
  As the comment says, this is because UDEREF conflicts with XEN. The help
  for the Kconfig option says:
 
 And why does it conflict with XEN? The documentation does not provide
 any specific pointers. From my view it is easy, it have to run on my
 test environments that features heavy virtualization of different types.

UDEREF and KERNEXEC makes intensive use of segmentation and tune some
low level stuff like the linker and thus breaks assumptions on which XEN
counts.

 
+++ debian/config/amd64/grsec/config(revision 0)
   Remove, no real settings here.
  What do you mean by “real” settings? PAX_PER_CPU_PGD is enabled by
  UDEREF and TASK_SIZE_MAX_SHIFT is set to 42 on amd64 because of how it
  has been implemented without segmentation.
 
 Real settings can be modified by the user, this two can't.

I still don't get it. I had the impression that
debian/config/arch/featureset/config role was to override
debian/config/featureset-featureset/config with arch-specific config
items.
 
  On mer., 2011-01-26 at 09:03 +0100, Bastian Blank wrote:
  On Tue, Jan 18, 2011 at 06:32:50PM +0100, Yves-Alexis Perez wrote:
I've started working on 2.6.37 since Brad Sprengler recently
  released
the grsecurity patch for that kernel.
   Is there VCS or is this just a code drop without information about
   changes? I was not even able to find older patches. Who does code
   reviews without that information?
  No there is no VCS unfortunately.
 
 You will need a git repository in the future. So please start with it.

I was kind-of waiting for the git linux-2.6 transition. I contacted Ben
Hutchings about his linux-2.6 tree on git.debian.org but he told me to
rather directly request to join the alioth project and don't wait for
the transition to happen. 
 
   The patch includes several modifications to selinux and random other
   parts. Why are they not merged? Please show that they have been
   submitted at least.
  As I already pointed out on the first mail, Brad Sprengler has already
  said he wasn't interested in upstreaming stuff.
 
 What Brad wants or don't want is irrelevant here. While the patch policy
 for the main kernel is rather strict, other featuresets can incorporate
 more changes. However this is no free ticket to push anything into it.
 
  There is an upstreaming
  effort for some specific bits (like the
  https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening#Upstream
  Hardening I already gave).
 
 Please explain how this is related to Grsecurity.

Well, as the page explains, this is about upstreaming a lot of kernel
and userland protections provided by Grsecurity: NX, ASLR, symbols
hiding...

 
 The selinux-specific part are related to the
  effort to make function pointers structures read-only (or do you have
  other specific parts in mind?).
 
 Everything that is not directly related to Grsecurity or PaX. And there
 is a lot.

The patch is only about Grsecurity and PaX protection. But while PaX is
mostly about memory protection, Grsecurity has multiple features:

* the RBAC system
* chroot protection
* info leak reduction
* arbitrary code execution prevention (both in kernel and in userland)

and that means it const-ify function pointers, it forces struct
initialization etc.

As said in the first mail, the Grsecurity patches usually cherry-picks
security bugfixes which are not yet in a released kernel. As the kernel
teams already do it, I remove those bits from the grsecurity patch. In
2.6.37 there's no need for that yet but I do it for the 2.6.32 I'm
tracking too. 
 
http://git.debian.org/?p=collab-maint/linux-grsec-base.git;a=summary
  if
needed.
   Why is this not part of the patch below?
  The grsec.conf was attached to the initial bug report. As there is no
  easy way to ship an external file in the linux-image, I was told it'd be
  a better idea to make an external package and that helps because I can
  do the user creation there and add a README.
 
 External _binary_ package, not source package.

I have to admit I don't know how to integrate a new binary package like
this using the existing linux-2.6 source package, but I'm not at all
opposed to include it in order to keep things at the same place. But
does the linux-2.6 architecture permits that? 
 
+CONFIG_DEBUG_STRICT_USER_COPY_CHECKS=y
   Please show why this should not be enabled globaly.
  Good point, it should. I'll make a separated bug report.
 
 No need for a bug.

Ok. 
 
+CONFIG_DEBUG_RODATA=y
  Fixed.
 
 The current patch even marks it as broken.

Yeah, right. PaX enforces itself readonly stuff (which is why it adds a
lot of const stuff) 

Bug#611216: linux-2.6 - New monitor chip: w83795

2011-01-26 Thread Bastian Blank
Package: linux-2.6
Version: 2.6.32-30
Severity: important

Please add support for new monitor chip w83795.

Bastian

-- System Information:
Debian Release: 6.0
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20110126212010.11420.34954.report...@wavehammer.waldi.eu.org



Re: I can hear audio CD (in console) with kernel 2.6.30 but not with 2.6.32-5-686 (squeeze)

2011-01-26 Thread Gérard Robin

Problem solved.
I just added at the bottom of the file /etc/modprobe.d/alsa-base.conf :

options snd-hda-intel model=acer

Sorry to have disturbed the list kernel-debian.

--
Gérard


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110126214824.GA5102@mauritiusGA



Bug#611099: Sporadic failure to resume from hibernation on Msi wind u100

2011-01-26 Thread Спицын Андрей
Thank you for prompt answer.
I removed VirtualBox, same result.
Any thoughts? 
-- 
С наилучшими пожеланиями,
Спицын Андрей.
--
Best regards,
Andrey Spitsyn.



В Срд, 26/01/2011 в 08:57 +1000, Ben Hutchings пишет: 
 On Tue, 2011-01-25 at 17:38 +0300, Спицын Андрей wrote:
  Package: linux-2.6
  Version: 2.6.32-30
  Severity: normal
  
  Laptop fails to wake after second or third hibernation. It's just reboot
  with no errors. Msi wind u100. I tryed recovery mode - same result. I
  tryed 2.6.32-3-686 (recovery mode) it works.
  It's happend after last update.
 [...]
 
 Try removing or disabling VirtualBox.
 
 Ben.
 




--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1296081195.2781.26.ca...@wind.gear



Bug#605090: Updated patch

2011-01-26 Thread maximilian attems
On Tue, 18 Jan 2011, Yves-Alexis Perez wrote:

 
 Kernel team, what do you think? Could the patches be merged against
 trunk? Config might still need some reviewing but that can be done once
 people start testing the packages.

What follows is my personal view, in short what I miss most is an
assessement of the involved cost of this specific feature branch.

first of all merging a patch that deviates from mainline for an
eternety and shows zero interest of upstream merging is not a 
good candidate. You get longterm plenty of cost versus allmost
no benefit. I'm quite unsure that this patch benefits Debian.
From a distant past look it was in fact quite untastefull.

The second trouble is that I question your understanding of this patch.
(viewing the way you answered waldi's questions).

Third beside security theatre what is gained by it?

Fourth why not invest the time for Wheezy and have finally the mainline
and security backed SELinux ready. This seems like a much better time
investment.

Fifth the ninties are over, an upstream that still doesn't use an VSC
seems very untrustworthy.


happy hacking

-- 
maks



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110126232927.gm5...@stro.at



Bug#506540: /usr/sbin/update-initramfs: update-initramfs miss symlink Possible missing firmware tigon

2011-01-26 Thread Ben Hutchings
On Wed, 2011-01-26 at 16:23 +0100, ~ tekmans ~ wrote:
  tags 506540 moreinfo
  stop
 
  On Wed, Jan 26, 2011 at 02:25:12PM +0100, tekmans wrote:
  Package: initramfs-tools
  Severity: normal
  File: /usr/sbin/update-initramfs
 
  miss symlink to the original tigon firmware installed during the debian
  installation added by usb stick
  resolve trouble by adding the missing link
 
  could you be more concrete and tell how this symlink /lib/firmware looks
  like,
  aka ls -l  of it, thanks.
 
 I was installing mdadm, sample output below
 
 update-initramfs: Generating /boot/initrd.img-2.6.32-5-686
 W: Possible missing firmware /lib/firmware/tigon/tg3_tso.bin for module tg3
 W: Possible missing firmware /lib/firmware/tigon/tg3.bin for module tg3
 
 ls -l  /lib/firmware/tigon/
 lrwxrwxrwx 1 root root   32 26 janv. 12:40 tg3.bin -
 /lib/firmware/tigon/tg3_tso5.bin
 -rwxr-xr-x 1 root root 3884 14 oct.   2009 tg3_tso5.bin
 lrwxrwxrwx 1 root root   32 26 janv. 12:40 tg3_tso.bin -
 /lib/firmware/tigon/tg3_tso5.bin
[...]

Are you *trying* to break your network card?

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#611234: linux-image-2.6.32-5-xen-amd64: enable CONFIG_XEN_PCI_PASSTHROUGH

2011-01-26 Thread Ward Vandewege
Package: linux-2.6
Version: 2.6.32-30
Severity: wishlist


CONFIG_XEN_PCI_PASSTHROUGH is not enabled by default in this kernel. It would
be nice to change that.

Thanks,
Ward. 

-- Package-specific info:
** Version:
Linux version 2.6.32-5-xen-amd64 (Debian 2.6.32-30) (b...@decadent.org.uk) (gcc 
version 4.3.5 (Debian 4.3.5-4) ) #1 SMP Wed Jan 12 05:46:49 UTC 2011

** Command line:
placeholder root=UUID=1ab080f3-e10c-45aa-91c9-a339c384e3b6 ro

** Tainted: W (512)
 * Taint on warning.

** Kernel log:
[3.794986] md: bindsda3
[3.797518] raid1: raid set md1 active with 2 out of 2 mirrors
[3.797662] md1: detected capacity change from 0 to 20479934464
[3.800146]  md1: unknown partition table
[3.856035] md: md2 stopped.
[3.858805] md: bindsdb4
[3.859160] md: bindsda4
[3.863825] raid1: raid set md2 active with 2 out of 2 mirrors
[3.863967] md2: detected capacity change from 0 to 2047934464
[3.866534]  md2: unknown partition table
[3.877599] device-mapper: uevent: version 1.0.3
[3.878230] device-mapper: ioctl: 4.15.0-ioctl (2009-04-01) initialised: 
dm-de...@redhat.com
[3.943448] PM: Starting manual resume from disk
[3.943583] PM: Resume from partition 9:2
[3.943585] PM: Checking hibernation image.
[3.944852] PM: Error -22 checking image file
[3.944855] PM: Resume from disk failed.
[3.982004] kjournald starting.  Commit interval 5 seconds
[3.982017] EXT3-fs: mounted filesystem with ordered data mode.
[4.831936] udev[631]: starting version 164
[4.955670] input: Power Button as 
/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input3
[4.955855] ACPI: Power Button [PWRB]
[4.956082] input: Power Button as 
/devices/LNXSYSTM:00/LNXPWRBN:00/input/input4
[4.956238] ACPI: Power Button [PWRF]
[5.161516] EDAC MC: Ver: 2.1.0 Jan 12 2011
[5.166756] EDAC amd64_edac:  Ver: 3.2.0 Jan 12 2011
[5.167301] EDAC amd64: ECC is enabled by BIOS.
[5.167887] EDAC amd64: ECC is enabled by BIOS.
[5.168156] EDAC amd64: ECC is enabled by BIOS.
[5.168415] EDAC amd64: ECC is enabled by BIOS.
[5.168739] EDAC MC: F10h CPU detected
[5.168799] input: PC Speaker as /devices/platform/pcspkr/input/input5
[5.168847] EDAC amd64: f10_probe_valid_hardware() This machine is running 
with DDR3 memory. This is not currently supported. DCHR0=0x3f48090d 
DCHR1=0x3f48090d
[5.168856] EDAC amd64:Contact 'amd64_edac' module MAINTAINER to help 
add support.
[5.177119] piix4_smbus :00:14.0: SMBus Host Controller at 0xb00, 
revision 0
[5.462701] Error: Driver 'pcspkr' is already registered, aborting...
[5.815025] md: md3 stopped.
[5.816108] md: bindsdb5
[5.816383] md: bindsda5
[5.824049] raid1: raid set md3 active with 2 out of 2 mirrors
[5.824266] md3: detected capacity change from 0 to 181553878016
[5.831727]  md3: unknown partition table
[6.464490] Adding 128k swap on /dev/md2.  Priority:-1 extents:1 
across:128k 
[6.665853] EXT3 FS on md1, internal journal
[6.810947] loop: module loaded
[6.985043] mlx4_ib: Mellanox ConnectX InfiniBand driver v1.0-ofed1.5.2 
(August 4, 2010)
[8.335417] ib_srp: ASYNC event= 11 on device= mlx4_0
[8.383296] ib_srp: ASYNC event= 17 on device= mlx4_0
[8.390935] ib_srp: ASYNC event= 9 on device= mlx4_0
[8.537955] igb: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX
[8.539734] ADDRCONF(NETDEV_UP): eth0: link is not ready
[8.546073] ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[9.468062] Event-channel device installed.
[9.646168]   alloc irq_desc for 4230 on node -1
[9.646173]   alloc kstat_irqs on node -1
[9.646264]   alloc irq_desc for 4229 on node -1
[9.646268]   alloc kstat_irqs on node -1
[9.646808] XENBUS: Unable to read cpu state
[9.647231] XENBUS: Unable to read cpu state
[9.647566] XENBUS: Unable to read cpu state
[9.647902] XENBUS: Unable to read cpu state
[9.648354] XENBUS: Unable to read cpu state
[9.648761] XENBUS: Unable to read cpu state
[9.649151] XENBUS: Unable to read cpu state
[9.649442] XENBUS: Unable to read cpu state
[9.649718] XENBUS: Unable to read cpu state
[9.650034] XENBUS: Unable to read cpu state
[9.650315] XENBUS: Unable to read cpu state
[9.650588] XENBUS: Unable to read cpu state
[9.650875] XENBUS: Unable to read cpu state
[9.651152] XENBUS: Unable to read cpu state
[9.651585] XENBUS: Unable to read cpu state
[9.652000] XENBUS: Unable to read cpu state
[   11.207121] Bridge firewalling registered
[   11.653335] ADDRCONF(NETDEV_UP): peth0: link is not ready
[   14.552581] igb: peth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX
[   14.558686] ADDRCONF(NETDEV_CHANGE): peth0: link becomes ready
[   14.720974] device peth0 entered promiscuous mode
[   14.764960] eth0: port 1(peth0) entering forwarding state
[   15.326131] ADDRCONF(NETDEV_UP): peth1: link is not ready
[   24.600059] 

Bug#611234: linux-image-2.6.32-5-xen-amd64: enable CONFIG_XEN_PCI_PASSTHROUGH

2011-01-26 Thread Ward Vandewege
On Wed, Jan 26, 2011 at 10:03:38PM -0500, Ward Vandewege wrote:
 Package: linux-2.6
 Version: 2.6.32-30
 Severity: wishlist
 
 
 CONFIG_XEN_PCI_PASSTHROUGH is not enabled by default in this kernel. It would
 be nice to change that.

Or, I guess, not - I see now that this option is no longer used. Sorry for
the noise.

Thanks,
Ward.




-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110127031505.ga4...@countzero.vandewege.net



Processed: closing 611234

2011-01-26 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 close 611234
Bug#611234: linux-image-2.6.32-5-xen-amd64: enable CONFIG_XEN_PCI_PASSTHROUGH
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug closed, send any further explanations to Ward Vandewege w...@jhvc.com

 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
611234: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611234
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.1296102842816.transcr...@bugs.debian.org